Enhancing cyber-attack prediction through optimized feature representation and advanced learning techniques

Authors

  • Akkineni Yogitha Department of Computer Science and Engineering, Velagapudi Ramakrishna Siddhartha Engineering College, Kanuru, Vijayawada, Andhra Pradesh, India Author
  • Bondili Sri Harsha Sai Singh Department of Computer Science and Engineering, Koneru Lakshmaiah Educational Foundations, Vaddesswaram, Guntur, Andhra Pradesh, India Author

DOI:

https://doi.org/10.56294/piii2025378

Keywords:

Fake News Detection, Natural Language Processing (NLP), Information Processing, Sentiment Analysis

Abstract

The integrity of computer networks and user security faces severe threats from web application attacks. Current threat detection techniques primarily rely on signature-based approaches, limiting their ability to recognize zero-day vulnerabilities. Moreover, the lack of comprehensive statistics on actual cyber-attacks further diminishes the effectiveness of these strategies. This paper introduces a comprehensive four-step methodology along with an architectural framework for the development of a robust cyberattack threat intelligence strategy. The initial phase involves data acquisition, encompassing the gathering of network traffic information and web page crawls, enabling the creation of feature vectors that effectively characterize cyber-attack information. Subsequently, the utilization of a sparse auto-encoder facilitates the analysis of the identified attack features. Finally, the proposed methodology incorporates the Convolutional Neural Network (ConvNNet) technique for systematic attack class prediction. Anomaly detection techniques are applied to forecast web-based attacks. The assessment leverages online cyber-attack datasets to evaluate the effectiveness of the proposed model. The original data yields a detection rate (DR) of 98.5% and a False Alarm Rate (FAR) of 9.5%. With training data, the model demonstrates an improved DR of 99% and a reduced FAR of 2%. Empirical analyses highlight the superior performance of the suggested approach compared to four competing machine learning methods, as evidenced by detection and false alarm rates across real-world and simulated web data

References

[1] T. Gao, F. Li, Y. Chen, and X. Zou, "Preserving local differential privacy in online social networks," in International Conference on Wireless Algorithms, Systems, and Applications. Springer, 2017, pp. 393–405.

[2] R. Girshick, "Faster R-CNN: Towards real-time object detection with region proposal networks," in Advances in Neural Information Processing Systems, 2015, pp. 91–99.

[3] Z. Levi and T. Hassner, "Age and gender classification using convolutional neural networks," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015, pp. 34–42.

[4] M. Khadangi and M. H. F. Zarandi, "From type-2 fuzzy rate-based neural networks to social networks' behaviors," in 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), July 2016, pp. 1970–1975.

[5] Z. Li, D. y. Sun, J. Li, and Z. f. Li, "Social network change detection using a genetic algorithm based backpropagation neural network model," in 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Aug 2016, pp. 1386–1387.

[6] A. Luna, M. N. del Prado, A. Talavera, and E. S. Holguín, "Power demand forecasting through social network activity and artificial neural networks," in 2016 IEEE ANDESCON, Oct 2016, pp. 1–4.

[7] I. Habernal, T. Pta'cek, and J. Steinberger, "Sentiment analysis in Czech social media using supervised machine learning," in Proceedings of the 4th workshop on computational approaches to subjectivity, sentiment and social media analysis, 2013, pp. 65–74.

[8] M. M. Hasan, M. M. Islam, M. I. I. Zarif, and M. M. A. Hashem, "Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches," Internet Things, vol. 7, Sep. 2019, Art. no. 100059.

[9] Sriram, "An efficient intrusion detection system based on hypergraph Genetic algorithm for parameter optimization and feature selection in support vector machine," Knowledge-Based Systems, vol. 134, pp. 1–12, Oct. 2017.

[10] Bhatt, E. T. Yano, and P. Gustavsson, "Towards a framework to detect multi-stage advanced persistent threats attacks," in Proc. IEEE 8th Int. Symp. Service Oriented Syst. Eng., Apr. 2014, pp. 390–395.

[11] Mazraeh, M. Ghanavati, and S. H. N. Neysi, "Intrusion detection system with decision tree and combine method algorithm," International Academic Journal of Science and Engineering, vol. 3, no. 8, pp. 21–31, 2016.

[12] Guo, Y. Ping, N. Liu, and S.-S. Luo, "A two-level hybrid approach for intrusion detection," Neurocomputing, vol. 214, pp. 391–400, Nov. 2016.

[13] Friedberg, F. Skopik, G. Settanni, and R. Fiedler, "Combating advanced persistent threats: From network event correlation to incident detection," Computers & Security, vol. 48, pp. 35–57, Feb. 2015.

[14] Ingre and A. Yadav, "Performance analysis of NSL-KDD dataset using ANN," in Proc. International Conference on Signal Processing, Communication, and Engineering Systems, Jan. 2015, pp. 92–96.

[15] Johnson and E. A. Hogan, "An analytic graph metric for mitigating advanced persistent threat," in Proc. IEEE International Conference on Intelligent Security Information, Jun. 2013, pp. 129–133.

[16] Aziz, A. E. Hassanien, S. E.-O. Hanaf, and M. F. Tolba, "Multilayer hybrid machine learning techniques for anomalies detection and classification approach," in Proc. 13th International Conference on Hybrid Intelligent Systems (HIS), Dec. 2013, pp. 215–220.

[17] Aziz, H. A. El-Mousad, S. E.-O. Hanaf, and M. F. Tolba, "Multilayer hybrid machine learning techniques for anomalies detection and classification approach," in Proceedings of the 13th International Conference on Hybrid Intelligent Systems (HIS), December 2013, pp. 215–220.

[18] Wang, Y. Li, Z. Chen, P. Zhang, and G. Zhang, "A survey of exploitation techniques and defenses for program data attacks," Journal of Network and Computer Applications, vol. 154, March 2020, Article no. 102534.

[19] Singh, P. K. Sharma, S. Y. Moon, D. Moon, and J. H. Park, "A comprehensive study on APT attacks and countermeasures for future networks and communications: Challenges and solutions," Journal of Supercomputing, vol. 75, no. 8, pp. 4543–4574, August 2019.

[20] Alshamrani, S. Myneni, A. Chowdhary, and D. Huang, "A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities," IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1851–1877, 2nd Quarter, 2019.

[21] Sherubha, "Graph-Based Event Measurement for Analyzing Distributed Anomalies in Sensor Networks," Sådhanå (Springer), 45:212, doi: 10.1007/s12046-020-01451-w.

[22] Sherubha, "An Efficient Network Threat Detection and Classification Method using ANP-MVPS Algorithm in Wireless Sensor Networks," International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8 Issue-11, September 2019.

[23] Sherubha, "An Efficient Intrusion Detection and Authentication Mechanism for Detecting Clone Attack in Wireless Sensor Networks," Journal of Advanced Research in Dynamical and Control Systems (JARDCS), Volume 11, issue 5, Pg No. 55-68.

[24] Cai, N. Meng, B. Ryder, and D. Yao, "DroidCat: Effective Android malware detection and categorization via app-level profiling," IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, pp. 1455–1470, June 2019.

[25] Moustafa, J. Hu, and J. Slay, "A holistic review of network anomaly detection systems: A comprehensive survey," Journal of Network and Computer Applications, vol. 128, pp. 33–55, February 2019.

[26] Peng, S. Yu, and A. Yang, "Smartphone malware and its propagation modeling: A survey," IEEE Communications Surveys & Tutorials, vol. 16, no. 2, pp. 925–941, 2nd Quarter, 2014.

[27] Delac, M. Silic, and J. Krolo, "Emerging security threats for mobile platforms," in Proceedings of the MIPRO 34th International Convention on Information and Communication Technology, Electronics, and Microelectronics, May 2011, pp. 1468–1473.

[28] Yang, J. Zhang, and G. Gu, "Understanding the market-level and network-level Behaviors of the Android malware ecosystem," in Proceedings of the IEEE 37th International Conference on Distributed Computing Systems (ICDCS), June 2017, pp. 2452–2457.

[29] S.-H. Seo, D.-G. Lee, and K. Yim, "Analysis on maliciousness for mobile applications," in Proceedings of the 6th International Conference on Innovative Mobile Internet Services in Ubiquitous Computing, July 2012, pp. 126–129.

[30] Gao and J. Liu, "Modeling and restraining mobile virus propagation," IEEE Transactions on Mobile Computing, vol. 12, no. 3, pp. 529–541, March 2013.

Downloads

Published

2025-01-05

How to Cite

1.
Akkineni Y, Bondili Sri Harsha SS. Enhancing cyber-attack prediction through optimized feature representation and advanced learning techniques. SCT Proceedings in Interdisciplinary Insights and Innovations [Internet]. 2025 Jan. 5 [cited 2025 Feb. 17];3:378. Available from: https://proceedings.ageditor.ar/index.php/piii/article/view/378